Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
72.48.214.68 attack
2019-12-01T09:27:55.297438suse-nuc sshd[25410]: Invalid user user from 72.48.214.68 port 36442
...
2020-02-18 09:50:37
72.48.214.68 attackbotsspam
Feb  1 13:20:09 sachi sshd\[26486\]: Invalid user ts3srv from 72.48.214.68
Feb  1 13:20:09 sachi sshd\[26486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
Feb  1 13:20:11 sachi sshd\[26486\]: Failed password for invalid user ts3srv from 72.48.214.68 port 41206 ssh2
Feb  1 13:24:05 sachi sshd\[26533\]: Invalid user 12345 from 72.48.214.68
Feb  1 13:24:05 sachi sshd\[26533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2020-02-02 07:30:54
72.48.214.68 attack
Jan 31 19:49:38 pkdns2 sshd\[18319\]: Invalid user kapardini from 72.48.214.68Jan 31 19:49:40 pkdns2 sshd\[18319\]: Failed password for invalid user kapardini from 72.48.214.68 port 44790 ssh2Jan 31 19:53:21 pkdns2 sshd\[18506\]: Invalid user sourabhi from 72.48.214.68Jan 31 19:53:23 pkdns2 sshd\[18506\]: Failed password for invalid user sourabhi from 72.48.214.68 port 44552 ssh2Jan 31 19:56:57 pkdns2 sshd\[18656\]: Invalid user zakariya from 72.48.214.68Jan 31 19:56:59 pkdns2 sshd\[18656\]: Failed password for invalid user zakariya from 72.48.214.68 port 42598 ssh2
...
2020-02-01 02:19:50
72.48.214.68 attackbots
Unauthorized connection attempt detected from IP address 72.48.214.68 to port 2220 [J]
2020-01-18 17:55:44
72.48.214.68 attack
Jan 14 03:44:31 firewall sshd[12699]: Invalid user admin from 72.48.214.68
Jan 14 03:44:32 firewall sshd[12699]: Failed password for invalid user admin from 72.48.214.68 port 38184 ssh2
Jan 14 03:47:04 firewall sshd[12770]: Invalid user sx from 72.48.214.68
...
2020-01-14 15:50:25
72.48.214.68 attackbots
Jan  4 11:22:31 vps46666688 sshd[28303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Jan  4 11:22:33 vps46666688 sshd[28303]: Failed password for invalid user testftp from 72.48.214.68 port 57904 ssh2
...
2020-01-04 23:43:52
72.48.214.68 attackbots
Nov 29 21:38:26 microserver sshd[28655]: Invalid user php from 72.48.214.68 port 52284
Nov 29 21:38:26 microserver sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 21:38:28 microserver sshd[28655]: Failed password for invalid user php from 72.48.214.68 port 52284 ssh2
Nov 29 21:38:38 microserver sshd[28689]: Invalid user usuario from 72.48.214.68 port 52652
Nov 29 21:38:38 microserver sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:42 microserver sshd[32999]: Invalid user dennis from 72.48.214.68 port 35318
Nov 29 22:04:42 microserver sshd[32999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:44 microserver sshd[32999]: Failed password for invalid user dennis from 72.48.214.68 port 35318 ssh2
Nov 29 22:04:52 microserver sshd[33010]: Invalid user tao from 72.48.214.68 port 35718
Nov 29 22:04:52
2019-11-30 04:13:13
72.48.214.68 attackspambots
2019-11-29T07:03:19.081872abusebot-8.cloudsearch.cf sshd\[14597\]: Invalid user christene from 72.48.214.68 port 47934
2019-11-29 19:10:36
72.48.214.68 attackspam
Nov 28 23:31:11 webhost01 sshd[4637]: Failed password for mysql from 72.48.214.68 port 49838 ssh2
Nov 28 23:31:40 webhost01 sshd[4647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
...
2019-11-29 01:03:06
72.48.214.68 attackbotsspam
fraudulent SSH attempt
2019-11-20 03:13:13
72.48.214.68 attackspam
Nov 17 18:29:36 icinga sshd[58019]: Failed password for root from 72.48.214.68 port 51284 ssh2
Nov 17 18:33:50 icinga sshd[62233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68 
Nov 17 18:33:52 icinga sshd[62233]: Failed password for invalid user operator from 72.48.214.68 port 50124 ssh2
...
2019-11-18 01:43:31
72.48.214.68 attackspambots
2019-11-14T08:22:24.5173251495-001 sshd\[27152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2019-11-14T08:22:26.8329231495-001 sshd\[27152\]: Failed password for invalid user glasshd from 72.48.214.68 port 54792 ssh2
2019-11-14T09:24:05.6184371495-001 sshd\[30120\]: Invalid user gellerman from 72.48.214.68 port 50596
2019-11-14T09:24:05.6255391495-001 sshd\[30120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2019-11-14T09:24:07.3887181495-001 sshd\[30120\]: Failed password for invalid user gellerman from 72.48.214.68 port 50596 ssh2
2019-11-14T09:28:18.2369921495-001 sshd\[30267\]: Invalid user rachel from 72.48.214.68 port 46584
2019-11-14T09:28:18.2400921495-001 sshd\[30267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
...
2019-11-15 00:53:34
72.48.214.68 attackbots
Nov 11 20:42:11 vibhu-HP-Z238-Microtower-Workstation sshd\[12612\]: Invalid user disasterbot from 72.48.214.68
Nov 11 20:42:11 vibhu-HP-Z238-Microtower-Workstation sshd\[12612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 11 20:42:13 vibhu-HP-Z238-Microtower-Workstation sshd\[12612\]: Failed password for invalid user disasterbot from 72.48.214.68 port 47142 ssh2
Nov 11 20:46:35 vibhu-HP-Z238-Microtower-Workstation sshd\[12883\]: Invalid user beni from 72.48.214.68
Nov 11 20:46:35 vibhu-HP-Z238-Microtower-Workstation sshd\[12883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
...
2019-11-12 02:18:15
72.48.214.68 attack
'Fail2Ban'
2019-11-11 18:54:50
72.48.214.68 attackspambots
Nov  5 07:17:28 olgosrv01 sshd[3483]: Invalid user sansao from 72.48.214.68
Nov  5 07:17:30 olgosrv01 sshd[3483]: Failed password for invalid user sansao from 72.48.214.68 port 53340 ssh2
Nov  5 07:17:30 olgosrv01 sshd[3483]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:31:52 olgosrv01 sshd[4586]: Failed password for r.r from 72.48.214.68 port 35456 ssh2
Nov  5 07:31:52 olgosrv01 sshd[4586]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:35:33 olgosrv01 sshd[4898]: Failed password for r.r from 72.48.214.68 port 47702 ssh2
Nov  5 07:35:33 olgosrv01 sshd[4898]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:39:00 olgosrv01 sshd[5139]: Invalid user admin from 72.48.214.68
Nov  5 07:39:02 olgosrv01 sshd[5139]: Failed password for invalid user admin from 72.48.214.68 port 59922 ssh2
Nov  5 07:39:02 olgosrv01 sshd[5139]: Received disconnect from 72.48.214.68: 11: Bye Bye [preauth]
Nov  5 07:42:39 olgosr........
-------------------------------
2019-11-08 18:12:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.48.21.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.48.21.53.			IN	A

;; AUTHORITY SECTION:
.			573	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 22:00:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
53.21.48.72.in-addr.arpa domain name pointer 72-48-21-53.dyn.grandenetworks.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.21.48.72.in-addr.arpa	name = 72-48-21-53.dyn.grandenetworks.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.31.160.165 attackspam
Attempted Denial of Service PROTOCOL-DNS DNS query amplification attempt
2019-10-01 03:13:29
216.244.66.232 attack
Automated report (2019-09-30T16:18:45+00:00). Misbehaving bot detected at this address.
2019-10-01 02:47:06
149.56.44.101 attack
Oct  1 00:22:15 areeb-Workstation sshd[27436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.101
Oct  1 00:22:18 areeb-Workstation sshd[27436]: Failed password for invalid user 1QAZ2WSX3EDC from 149.56.44.101 port 51344 ssh2
...
2019-10-01 02:54:58
152.136.102.131 attackspam
fraudulent SSH attempt
2019-10-01 03:10:51
62.94.244.235 attack
Sep 30 16:29:00 meumeu sshd[18502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.244.235 
Sep 30 16:29:03 meumeu sshd[18502]: Failed password for invalid user justin1 from 62.94.244.235 port 45818 ssh2
Sep 30 16:34:11 meumeu sshd[19240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.244.235 
...
2019-10-01 02:49:51
157.230.63.232 attackspam
Automatic report - Banned IP Access
2019-10-01 03:13:44
156.223.60.241 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-10-01 03:25:02
77.42.79.121 attackspambots
Automatic report - Port Scan Attack
2019-10-01 03:04:57
222.124.16.227 attackspambots
Sep 30 21:19:13 MK-Soft-Root1 sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227 
Sep 30 21:19:15 MK-Soft-Root1 sshd[2539]: Failed password for invalid user www from 222.124.16.227 port 56906 ssh2
...
2019-10-01 03:24:17
116.210.116.229 attack
Automated reporting of FTP Brute Force
2019-10-01 03:19:01
198.58.107.53 attack
Sep 30 12:10:43 thevastnessof sshd[2495]: Failed password for root from 198.58.107.53 port 41142 ssh2
...
2019-10-01 03:21:02
106.12.36.42 attack
Sep 30 20:30:06 mail sshd\[30556\]: Invalid user sshvpn from 106.12.36.42 port 58698
Sep 30 20:30:06 mail sshd\[30556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
Sep 30 20:30:08 mail sshd\[30556\]: Failed password for invalid user sshvpn from 106.12.36.42 port 58698 ssh2
Sep 30 20:34:22 mail sshd\[31080\]: Invalid user minecraft from 106.12.36.42 port 39420
Sep 30 20:34:22 mail sshd\[31080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
2019-10-01 02:46:28
177.135.51.236 attack
Telnet/23 MH Probe, BF, Hack -
2019-10-01 02:44:59
119.114.97.199 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-01 03:11:13
80.22.196.98 attackspam
Sep 30 20:39:30 OPSO sshd\[4973\]: Invalid user alvarie from 80.22.196.98 port 39845
Sep 30 20:39:30 OPSO sshd\[4973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.22.196.98
Sep 30 20:39:32 OPSO sshd\[4973\]: Failed password for invalid user alvarie from 80.22.196.98 port 39845 ssh2
Sep 30 20:43:58 OPSO sshd\[6058\]: Invalid user ssegun from 80.22.196.98 port 53324
Sep 30 20:43:58 OPSO sshd\[6058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.22.196.98
2019-10-01 02:58:20

Recently Reported IPs

202.168.64.132 117.204.128.80 103.90.189.162 159.93.153.128
130.152.68.109 72.162.106.44 228.62.88.239 24.100.101.226
37.58.109.117 176.179.232.230 173.26.78.107 125.28.134.244
101.25.90.228 157.138.204.231 17.184.56.5 61.43.125.59
5.129.253.163 95.131.250.107 243.172.60.204 39.145.197.138